DevOps Security

CyberArk Privileged Account Security for DevOps

Today’s software delivery pipeline centers on delivering high-quality products and services to market faster and more efficiently than ever before. This is made possible through the use of DevOps methodologies. DevOps focuses on rapid, continuous development, integration, delivery and deployment; it was not fundamentally designed with security in mind. Yet, nearly every component of the highly interconnected and rapidly changing DevOps ecosystem utilizes secrets including:

Infrastructure: Hosts, machines and systems that are created and used in almost every environment (development, testing, staging and production)

Continuous Integration and Continuous Delivery (CI/CD) tools: Tools, along with process scripts such as manifests, playbooks and cookbooks, which run across pipeline stages and environments

Applications and micro-services: The final outputs of the delivery pipeline

Additionally, developers, IT operations staff and administrators require quick, easy workflow to do their jobs effectively, and as such, cannot be constrained by restrictive policies that impede the velocity of the delivery pipeline.

Secrets represent one of the largest security vulnerabilities an organization faces today. In the hands of an external attacker or malicious insider, secrets allow attackers to take full control of an organization’s IT infrastructure, disable security controls, steal confidential information, commit financial fraud and disrupt operations.

Secure and manage secrets (e.g. passwords, encryption keys, SSH keys and tokens) used by machines (e.g. applications, containers, micro-services and EC2 instances) and users throughout the DevOps pipeline. Secrets are automatically stored and rotated based on the organization’s security policy.

Secure secrets retrieval by machines based on strong application authentication. The solution provides modern APIs, such as C#, C++, Python, Java, .Net, Go, Ruby and Node.js for extended platform support.

Control and monitor privileged user access to CI/CD tool as well as cloud platform consoles.

Enforce the least privilege principle by limiting privileged user access to sensitive resources, such as hosts (in ‘break glass’ scenarios) and centrally manage privilege escalation. User privileges can automatically be elevated in an on-demand, one-time basis in accordance with established access policies.

Provide centralized audit and reporting capabilities to address IT audit requirements with automated enforcement of privileged account policies (e.g. frequency of secrets rotation and password complexity). All audit records are stored in tamper-proof storage to prevent unauthorized access, modification or deletion of logs.

Cloud-native, scalable solution built to support massive concurrent usage as well as performance spikes. Leveraging capabilities such as Amazon Auto Scaling Groups (ASG), the solution has demonstrated elastic, horizontal scaling at massive loads.

High Availability architecture delivered as clustered software to ensure the highest degree of uptime and availability for cloud and DevOps environments.

Key Benefits:

Centralized secrets protection, management and auditing. Automatically secures and manages secrets (e.g. passwords, SSH keys and API keys) of users and machines from the instant they are created. All secrets-related events are automatically and immutably logged for audit purposes.

Granular least privilege access control. Implements least privilege policies by controlling which DevOps resources privileged users can access and limits what they are authorized to do with those resources based on their roles and tasks.

Controlled and monitored user access to sensitive DevOps resources. Centralizes access to DevOps resources to maximize control and visibility.

Request a Demo

Thanks for Your Interest!

We'll be in touch with you shortly.

We'll be contacting you shortly regarding your interest in CyberArk. If you have an immediate need to speak with us, please call us at 1-888-808-9005.